Coverity-updates archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

New Defects reported by Coverity Scan for NetBSD-i386-user



Hi,

Please find the latest report on new defect(s) introduced to NetBSD-i386-user found with Coverity Scan.

137 new defect(s) introduced to NetBSD-i386-user found with Coverity Scan.
74 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 20 of 137 defect(s)


** CID 271016:  Null pointer dereferences  (FORWARD_NULL)
/external/gpl3/gdb/dist/gdb/printcmd.c: 1113 in do_examine()


________________________________________________________________________________________________________
*** CID 271016:  Null pointer dereferences  (FORWARD_NULL)
/external/gpl3/gdb/dist/gdb/printcmd.c: 1113 in do_examine()
1107               next_address = find_string_backward (gdbarch, addr, count,
1108                                                    TYPE_LENGTH (val_type),
1109                                                    &opts, &count);
1110             }
1111           else
1112             {
>>>     CID 271016:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "val_type".
1113               next_address = addr - count * TYPE_LENGTH (val_type);
1114             }
1115     
1116           /* The following call to print_formatted updates next_address in every
1117              iteration.  In backward case, we store the start address here
1118              and update next_address with it before exiting the function.  */

** CID 745855:    (RESOURCE_LEAK)
/external/gpl3/gdb/dist/bfd/elflink.c: 10241 in elf_link_input_bfd()
/external/gpl3/gdb/dist/bfd/elflink.c: 10304 in elf_link_input_bfd()
/external/gpl3/binutils/dist/bfd/elflink.c: 10240 in elf_link_input_bfd()
/external/gpl3/binutils/dist/bfd/elflink.c: 10303 in elf_link_input_bfd()


________________________________________________________________________________________________________
*** CID 745855:    (RESOURCE_LEAK)
/external/gpl3/gdb/dist/bfd/elflink.c: 10241 in elf_link_input_bfd()
10235     		      sprintf_vma (buffer, rel->r_info);
10236     		      (*_bfd_error_handler)
10237     			(_("error: %B contains a reloc (0x%s) for section %A "
10238     			   "that references a non-existent global symbol"),
10239     			 input_bfd, o, buffer);
10240     		      bfd_set_error (bfd_error_bad_value);
>>>     CID 745855:    (RESOURCE_LEAK)
>>>     Variable "internal_relocs" going out of scope leaks the storage it points to.
10241     		      return FALSE;
10242     		    }
10243     
10244     		  while (h->root.type == bfd_link_hash_indirect
10245     			 || h->root.type == bfd_link_hash_warning)
10246     		    h = (struct elf_link_hash_entry *) h->root.u.i.link;
/external/gpl3/gdb/dist/bfd/elflink.c: 10304 in elf_link_input_bfd()
10298     		  printf (" reloc : info %8.8lx, addr %8.8lx\n",
10299     			  (unsigned long) rel->r_info,
10300     			  (unsigned long) rel->r_offset);
10301     #endif
10302     		  if (!eval_symbol (&val, &sym_name, input_bfd, flinfo, dot,
10303     				    isymbuf, locsymcount, s_type == STT_SRELC))
>>>     CID 745855:    (RESOURCE_LEAK)
>>>     Variable "internal_relocs" going out of scope leaks the storage it points to.
10304     		    return FALSE;
10305     
10306     		  /* Symbol evaluated OK.  Update to absolute value.  */
10307     		  set_symbol_value (input_bfd, isymbuf, locsymcount,
10308     				    r_symndx, val);
10309     		  continue;
/external/gpl3/binutils/dist/bfd/elflink.c: 10240 in elf_link_input_bfd()
10234     		      sprintf_vma (buffer, rel->r_info);
10235     		      (*_bfd_error_handler)
10236     			(_("error: %B contains a reloc (0x%s) for section %A "
10237     			   "that references a non-existent global symbol"),
10238     			 input_bfd, o, buffer);
10239     		      bfd_set_error (bfd_error_bad_value);
>>>     CID 745855:    (RESOURCE_LEAK)
>>>     Variable "internal_relocs" going out of scope leaks the storage it points to.
10240     		      return FALSE;
10241     		    }
10242     
10243     		  while (h->root.type == bfd_link_hash_indirect
10244     			 || h->root.type == bfd_link_hash_warning)
10245     		    h = (struct elf_link_hash_entry *) h->root.u.i.link;
/external/gpl3/binutils/dist/bfd/elflink.c: 10303 in elf_link_input_bfd()
10297     		  printf (" reloc : info %8.8lx, addr %8.8lx\n",
10298     			  (unsigned long) rel->r_info,
10299     			  (unsigned long) rel->r_offset);
10300     #endif
10301     		  if (!eval_symbol (&val, &sym_name, input_bfd, flinfo, dot,
10302     				    isymbuf, locsymcount, s_type == STT_SRELC))
>>>     CID 745855:    (RESOURCE_LEAK)
>>>     Variable "internal_relocs" going out of scope leaks the storage it points to.
10303     		    return FALSE;
10304     
10305     		  /* Symbol evaluated OK.  Update to absolute value.  */
10306     		  set_symbol_value (input_bfd, isymbuf, locsymcount,
10307     				    r_symndx, val);
10308     		  continue;

** CID 976316:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 95 in npf_table_test()


________________________________________________________________________________________________________
*** CID 976316:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 95 in npf_table_test()
89     
90     	tblset = npf_tableset_create(3);
91     	fail |= !(tblset != NULL);
92     
93     	/* Table ID 1, using hash table with 256 lists. */
94     	t1 = npf_table_create(HASH_TID, 0, NPF_TABLE_HASH, NULL, 256);
>>>     CID 976316:  Null pointer dereferences  (FORWARD_NULL)
>>>     Comparing "t1" to null implies that "t1" might be null.
95     	fail |= !(t1 != NULL);
96     	error = npf_tableset_insert(tblset, t1);
97     	fail |= !(error == 0);
98     
99     	/* Check for double-insert. */
100     	error = npf_tableset_insert(tblset, t1);

** CID 976933:  Null pointer dereferences  (NULL_RETURNS)
/external/bsd/openldap/dist/libraries/libldap/tls_o.c: 815 in tlso_sb_setup()


________________________________________________________________________________________________________
*** CID 976933:  Null pointer dereferences  (NULL_RETURNS)
/external/bsd/openldap/dist/libraries/libldap/tls_o.c: 815 in tlso_sb_setup()
809     		return -1;
810     	}
811     	
812     	p->session = arg;
813     	p->sbiod = sbiod;
814     	bio = BIO_new( &tlso_bio_method );
>>>     CID 976933:  Null pointer dereferences  (NULL_RETURNS)
>>>     Dereferencing a null pointer "bio".
815     	bio->ptr = (void *)p;
816     	SSL_set_bio( p->session, bio, bio );
817     	sbiod->sbiod_pvt = p;
818     	return 0;
819     }
820     

** CID 976963:  Null pointer dereferences  (NULL_RETURNS)
/external/gpl3/gdb/dist/gdb/dwarf2-frame.c: 1512 in dwarf2_frame_cfa()


________________________________________________________________________________________________________
*** CID 976963:  Null pointer dereferences  (NULL_RETURNS)
/external/gpl3/gdb/dist/gdb/dwarf2-frame.c: 1512 in dwarf2_frame_cfa()
1506       if (frame_unwinder_is (this_frame, &record_btrace_tailcall_frame_unwind)
1507           || frame_unwinder_is (this_frame, &record_btrace_frame_unwind))
1508         throw_error (NOT_AVAILABLE_ERROR,
1509     		 _("cfa not available for record btrace target"));
1510     
1511       while (get_frame_type (this_frame) == INLINE_FRAME)
>>>     CID 976963:  Null pointer dereferences  (NULL_RETURNS)
>>>     Assigning: "this_frame" = null return value from "get_prev_frame".
1512         this_frame = get_prev_frame (this_frame);
1513       if (get_frame_unwind_stop_reason (this_frame) == UNWIND_UNAVAILABLE)
1514         throw_error (NOT_AVAILABLE_ERROR,
1515                     _("can't compute CFA for this frame: "
1516                       "required registers or memory are unavailable"));
1517     

** CID 976964:  Null pointer dereferences  (NULL_RETURNS)
/external/gpl3/gdb/dist/gdb/elfread.c: 899 in elf_gnu_ifunc_resolver_stop()


________________________________________________________________________________________________________
*** CID 976964:  Null pointer dereferences  (NULL_RETURNS)
/external/gpl3/gdb/dist/gdb/elfread.c: 899 in elf_gnu_ifunc_resolver_stop()
893     /* Handle inferior hit of bp_gnu_ifunc_resolver, see its definition.  */
894     
895     static void
896     elf_gnu_ifunc_resolver_stop (struct breakpoint *b)
897     {
898       struct breakpoint *b_return;
>>>     CID 976964:  Null pointer dereferences  (NULL_RETURNS)
>>>     Assigning: "prev_frame" = null return value from "get_prev_frame".
899       struct frame_info *prev_frame = get_prev_frame (get_current_frame ());
900       struct frame_id prev_frame_id = get_stack_frame_id (prev_frame);
901       CORE_ADDR prev_pc = get_frame_pc (prev_frame);
902       int thread_id = ptid_to_global_thread_id (inferior_ptid);
903     
904       gdb_assert (b->type == bp_gnu_ifunc_resolver);

** CID 979570:  Uninitialized variables  (UNINIT)
/sys/netinet/ip_carp.c: 992 in carp_send_ad()


________________________________________________________________________________________________________
*** CID 979570:  Uninitialized variables  (UNINIT)
/sys/netinet/ip_carp.c: 992 in carp_send_ad()
986     
987     
988     static void
989     carp_send_ad(void *v)
990     {
991     	struct carp_header ch;
>>>     CID 979570:  Uninitialized variables  (UNINIT)
>>>     Declaring variable "tv" without initializer.
992     	struct timeval tv;
993     	struct carp_softc *sc = v;
994     	struct carp_header *ch_ptr;
995     	struct mbuf *m;
996     	int error, len, advbase, advskew, s;
997     	struct sockaddr sa;

** CID 980439:  Memory - illegal accesses  (OVERRUN)
/sys/kern/sys_ptrace_common.c: 1074 in process_dofpregs()


________________________________________________________________________________________________________
*** CID 980439:  Memory - illegal accesses  (OVERRUN)
/sys/kern/sys_ptrace_common.c: 1074 in process_dofpregs()
1068     	if (uio->uio_offset < 0 || uio->uio_offset > (off_t)sizeof(r))
1069     		return EINVAL;
1070     
1071     	kl = sizeof(r);
1072     	kv = (char *)&r;
1073     
>>>     CID 980439:  Memory - illegal accesses  (OVERRUN)
>>>     Incrementing "kv" by 108. "kv" may now point between bytes 0 and 108 (inclusive) of "r" (which consists of 108 bytes).
1074     	kv += uio->uio_offset;
1075     	kl -= uio->uio_offset;
1076     	if (kl > uio->uio_resid)
1077     		kl = uio->uio_resid;
1078     
1079     	error = process_read_fpregs(l, &r, &kl);

** CID 980440:  Memory - illegal accesses  (OVERRUN)
/sys/kern/sys_ptrace_common.c: 1024 in process_doregs()


________________________________________________________________________________________________________
*** CID 980440:  Memory - illegal accesses  (OVERRUN)
/sys/kern/sys_ptrace_common.c: 1024 in process_doregs()
1018     	if (uio->uio_offset < 0 || uio->uio_offset > (off_t)sizeof(r))
1019     		return EINVAL;
1020     
1021     	kl = sizeof(r);
1022     	kv = (char *)&r;
1023     
>>>     CID 980440:  Memory - illegal accesses  (OVERRUN)
>>>     Incrementing "kv" by 64. "kv" may now point between bytes 0 and 64 (inclusive) of "r" (which consists of 64 bytes).
1024     	kv += uio->uio_offset;
1025     	kl -= uio->uio_offset;
1026     	if ((size_t)kl > uio->uio_resid)
1027     		kl = uio->uio_resid;
1028     
1029     	error = process_read_regs(l, &r);

** CID 997262:  Resource leaks  (RESOURCE_LEAK)
/sys/external/bsd/acpica/dist/compiler/prmacros.c: 456 in PrAddMacro()


________________________________________________________________________________________________________
*** CID 997262:  Resource leaks  (RESOURCE_LEAK)
/sys/external/bsd/acpica/dist/compiler/prmacros.c: 456 in PrAddMacro()
450     
451             DefineInfo->Body = Body;
452             DefineInfo->Args = Args;
453             DefineInfo->ArgCount = ArgCount;
454         }
455     
>>>     CID 997262:  Resource leaks  (RESOURCE_LEAK)
>>>     Variable "Args" going out of scope leaks the storage it points to.
456         return;
457     
458     
459     ErrorExit:
460         ACPI_FREE (Args);
461         return;

** CID 1013332:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 105 in npf_table_test()


________________________________________________________________________________________________________
*** CID 1013332:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 105 in npf_table_test()
99     	/* Check for double-insert. */
100     	error = npf_tableset_insert(tblset, t1);
101     	fail |= !(error != 0);
102     
103     	/* Table ID 2, using a prefix tree. */
104     	t2 = npf_table_create(TREE_TID, 1, NPF_TABLE_TREE, NULL, 0);
>>>     CID 1013332:  Null pointer dereferences  (FORWARD_NULL)
>>>     Comparing "t2" to null implies that "t2" might be null.
105     	fail |= !(t2 != NULL);
106     	error = npf_tableset_insert(tblset, t2);
107     	fail |= !(error == 0);
108     
109     	/* Table ID 3, using a CDB. */
110     	cdb = malloc(size, M_TEMP, M_WAITOK);

** CID 1088030:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/lib/hx509/ca.c: 1099 in ca_sign()


________________________________________________________________________________________________________
*** CID 1088030:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/lib/hx509/ca.c: 1099 in ca_sign()
1093     	if (tbsc->serialNumber.data == NULL){
1094     	    ret = ENOMEM;
1095     	    hx509_set_error_string(context, 0, ret, "Out of memory");
1096     	    goto out;
1097     	}
1098     	/* XXX diffrent */
>>>     CID 1088030:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "RAND_bytes" without checking return value (as is done elsewhere 80 out of 100 times).
1099     	RAND_bytes(tbsc->serialNumber.data, tbsc->serialNumber.length);
1100     	((unsigned char *)tbsc->serialNumber.data)[0] &= 0x7f;
1101         }
1102         /* signature            AlgorithmIdentifier, */
1103         ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
1104         if (ret) {

** CID 1088031:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/protocol.c: 1284 in kcm_op_add_ntlm_cred()


________________________________________________________________________________________________________
*** CID 1088031:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/protocol.c: 1284 in kcm_op_add_ntlm_cred()
1278         krb5_error_code ret;
1279     
1280         cred = calloc(1, sizeof(*cred));
1281         if (cred == NULL)
1282     	return ENOMEM;
1283     
>>>     CID 1088031:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "RAND_bytes" without checking return value (as is done elsewhere 80 out of 100 times).
1284         RAND_bytes(cred->uuid, sizeof(cred->uuid));
1285     
1286         ret = krb5_ret_stringz(request, &cred->user);
1287         if (ret)
1288     	goto error;
1289     

** CID 1088032:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/cache.c: 550 in kcm_ccache_store_cred_internal()


________________________________________________________________________________________________________
*** CID 1088032:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/cache.c: 550 in kcm_ccache_store_cred_internal()
544     	;
545     
546         *c = (struct kcm_creds *)calloc(1, sizeof(**c));
547         if (*c == NULL)
548     	return KRB5_CC_NOMEM;
549     
>>>     CID 1088032:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "RAND_bytes" without checking return value (as is done elsewhere 80 out of 100 times).
550         RAND_bytes((*c)->uuid, sizeof((*c)->uuid));
551     
552         *credp = &(*c)->cred;
553     
554         if (copy) {
555     	ret = krb5_copy_creds_contents(context, creds, *credp);

** CID 1088033:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/cache.c: 305 in kcm_ccache_alloc()


________________________________________________________________________________________________________
*** CID 1088033:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/heimdal/dist/kcm/cache.c: 305 in kcm_ccache_alloc()
299     	}
300     	slot->next = ccache_head;
301     	HEIMDAL_MUTEX_init(&slot->mutex);
302     	new_slot = 1;
303         }
304     
>>>     CID 1088033:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "RAND_bytes" without checking return value (as is done elsewhere 80 out of 100 times).
305         RAND_bytes(slot->uuid, sizeof(slot->uuid));
306     
307         slot->name = strdup(name);
308         if (slot->name == NULL) {
309     	ret = KRB5_CC_NOMEM;
310     	goto out;

** CID 1140482:  Parse warnings  (PARSE_ERROR)
/external/gpl3/gcc/dist/libgcc/soft-fp/quad.h: 69 in ()


________________________________________________________________________________________________________
*** CID 1140482:  Parse warnings  (PARSE_ERROR)
/external/gpl3/gcc/dist/libgcc/soft-fp/quad.h: 69 in ()
63     
64     #define _FP_WFRACBITS_DW_Q	(2 * _FP_WFRACBITS_Q)
65     #define _FP_WFRACXBITS_DW_Q	(_FP_FRACTBITS_DW_Q - _FP_WFRACBITS_DW_Q)
66     #define _FP_HIGHBIT_DW_Q	\
67       ((_FP_W_TYPE) 1 << (_FP_WFRACBITS_DW_Q - 1) % _FP_W_TYPE_SIZE)
68     
>>>     CID 1140482:  Parse warnings  (PARSE_ERROR)
>>>     During compilation of file '/home/phil/cov/src/external/gpl3/gcc/dist/libgcc/soft-fp/addtf3.c'
69     typedef float TFtype __attribute__ ((mode (TF)));
70     
71     #if _FP_W_TYPE_SIZE < 64
72     
73     union _FP_UNION_Q
74     {

** CID 1175808:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 114 in npf_table_test()


________________________________________________________________________________________________________
*** CID 1175808:  Null pointer dereferences  (FORWARD_NULL)
/usr.sbin/npf/npftest/libnpftest/npf_table_test.c: 114 in npf_table_test()
108     
109     	/* Table ID 3, using a CDB. */
110     	cdb = malloc(size, M_TEMP, M_WAITOK);
111     	memcpy(cdb, blob, size);
112     
113     	t3 = npf_table_create(CDB_TID, 2, NPF_TABLE_CDB, cdb, size);
>>>     CID 1175808:  Null pointer dereferences  (FORWARD_NULL)
>>>     Comparing "t3" to null implies that "t3" might be null.
114     	fail |= !(t3 != NULL);
115     	error = npf_tableset_insert(tblset, t3);
116     	fail |= !(error == 0);
117     
118     	/* Attempt to match non-existing entries - should fail. */
119     	addr->s6_addr32[0] = inet_addr(ip_list[0]);

** CID 1211911:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/openssl/dist/ssl/ssl_cert.c: 1129 in ssl_add_cert_chain()


________________________________________________________________________________________________________
*** CID 1211911:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/openssl/dist/ssl/ssl_cert.c: 1129 in ssl_add_cert_chain()
1123                 X509_STORE_CTX xs_ctx;
1124     
1125                 if (!X509_STORE_CTX_init(&xs_ctx, chain_store, x, NULL)) {
1126                     SSLerr(SSL_F_SSL_ADD_CERT_CHAIN, ERR_R_X509_LIB);
1127                     return (0);
1128                 }
>>>     CID 1211911:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "X509_verify_cert" without checking return value (as is done elsewhere 12 out of 15 times).
1129                 X509_verify_cert(&xs_ctx);
1130                 /* Don't leave errors in the queue */
1131                 ERR_clear_error();
1132                 for (i = 0; i < sk_X509_num(xs_ctx.chain); i++) {
1133                     x = sk_X509_value(xs_ctx.chain, i);
1134     

** CID 1211912:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/openssl/dist/crypto/x509v3/v3_scts.c: 166 in timestamp_print()


________________________________________________________________________________________________________
*** CID 1211912:  Error handling issues  (CHECKED_RETURN)
/crypto/external/bsd/openssl/dist/crypto/x509v3/v3_scts.c: 166 in timestamp_print()
160         /*
161          * Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
162          * characters long with a final Z. Update it with fractional seconds.
163          */
164         BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
165                      ASN1_STRING_data(gen), (unsigned int)(timestamp % 1000));
>>>     CID 1211912:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "ASN1_GENERALIZEDTIME_set_string" without checking return value (as is done elsewhere 5 out of 6 times).
166         ASN1_GENERALIZEDTIME_set_string(gen, genstr);
167         ASN1_GENERALIZEDTIME_print(out, gen);
168         ASN1_GENERALIZEDTIME_free(gen);
169     }
170     
171     static void SCT_free(SCT *sct)

** CID 1211914:  Control flow issues  (DEADCODE)
/crypto/external/bsd/openssl/dist/apps/s_cb.c: 484 in ssl_print_curves()


________________________________________________________________________________________________________
*** CID 1211914:  Control flow issues  (DEADCODE)
/crypto/external/bsd/openssl/dist/apps/s_cb.c: 484 in ssl_print_curves()
478                 if (!cname)
479                     cname = OBJ_nid2sn(nid);
480                 BIO_printf(out, "%s", cname);
481             }
482         }
483         if (ncurves == 0)
>>>     CID 1211914:  Control flow issues  (DEADCODE)
>>>     Execution cannot reach this statement: "BIO_puts(out, "NONE");".
484             BIO_puts(out, "NONE");
485         OPENSSL_free(curves);
486         if (noshared) {
487             BIO_puts(out, "\n");
488             return 1;
489         }


________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRb2JZfDAOAZcqzsy8LMBKBjZiXDg7WCnKqBB1q-2FtZ4dvE2p1AmNMmYII14NbCr9wIc-3D_XWm3CUIFU8ffmjzuNhQ8cIHoQgXzXkm61Fmjr59D05UtAPtOt5-2F893bscFU08ik-2Bkogm1zvDkUcDC6XHDxX-2BZA7DAmWXMOU-2F2-2BAggyY-2FiolrsYiL5o672HE0-2BkeAjIuPltl5iQSvQzM5-2BO0OKU5lYjJlKkIcmN8WRSdCdy1nnjOpTc7i2Ma3sTiCQW6grQ4Ui0zoJWHzLclnSL9OE-2ByV9-2FjkutRXaPojx5P6ogKNhi0-3D

To manage Coverity Scan email notifications for "coverity-updates%netbsd.org@localhost", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4m7U7Yoel-2F6MYPxol7ToiLwYIjoNbVQOCAwEeTNJofEDwTlN0JRhKMyijhpnAObR-2FlLVG-2Fr3EBKWgiICNdX1HPA6Ws0-2F1wHBf2tG9AnMDB8g-3D_XWm3CUIFU8ffmjzuNhQ8cIHoQgXzXkm61Fmjr59D05UtAPtOt5-2F893bscFU08ik-2Bkogm1zvDkUcDC6XHDxX-2BZHOooFxNOELRuCgzV73kjWCljftN-2FalKYQ6TJkpUrEpwJG7V9abr1WN5opalnbMhQNb7gmUzSNXzxy5tkUixxEEJAx-2FVa-2F-2BmfOpDzQXorBjyVwOEP5zZnCj6OGT5xkZL1O4G7FvkU28NZrLIzG9hQTo-3D



Home | Main Index | Thread Index | Old Index